The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A watermarking scheme for content based image authentication is proposed which, in addition to authentication, has the ability to localize and correct modifications / errors. The watermark is based on the frequency domain features of an image and it is protected using error correcting codes. The use of error correcting codes helps in error localization and correction. The frequency domain features...
We consider a cellular Internet of things (CIoT) network where many source nodes aim at exchanging messages with a single concentrator node. To this end, they are assisted by anchor nodes that are trusted and securely connected with the concentrator node. In this context, we aim at providing a message authentication scheme based on the characteristics of the channel between the source nodes and the...
Requirement of safety, roadway capacity and efficiency in vehicular network, which makes autonomous driving concept continue to be of interest. To achieve automated cooperative driving, vehicles form a platoon. For the authentication in vehicular platoons, efficiency and security are the two things of great significance. Cooperative authentication is a way to help recognize false identities and messages...
Carpooling, as an effective and eco-friendly travel mode, becomes a kind of public spontaneous behavior with multiple travellers sharing a vehicle to reduce individuals' travel cost, carbon emissions and traffic congestion. Although ubiquitous network access offers great convenience for travellers to find carpools, the safety becomes a big obstacle for them to accept this emerging travel mode. To...
The growing importance of smart devices calls for effective user authentication mechanisms. We argue that state-of-the-art authentication mechanisms are either vulnerable to known attacks or do not meet usability needs. To address this problem we designed NomadiKey, a user-to-device authentication mechanism based on nomadic keyboard keys. NomadiKey increases security level by placing keys at different...
In this paper, we propose a new security design, called as Zero Reconciliation Secret Key Extraction, for backscatter wireless systems, in which a reader needs to establish secret keys for multiple tags. Our design is able to eliminate the reconciliation process in conventional physical layer based key establishment, therefore improving the efficiency while still maintaining security in such a process...
Recent research in the performance of public key algorithms, such as Elliptic Curve Cryptography (ECC), have illustrated upon their practical applicability in sensor networks. With this research, we are proposing an optimization to one of the most critical operations in Public Key Cryptography (PKC)-authentication of the public key. Here, we provide a framework that proposes a resource-efficient,...
Current Internet architecture is becoming inadequate for new requirements of highly scalable and efficient distribution of contents. Information Centric Networking (ICN) is one of the alternatives for the Next Generation Internet (NGI), which focuses mainly on contents. In-network caching is one of the major attributes of ICN, which allows contents to be cached in any ICN node. Any user can access...
Future fifth generation (5G) wireless infrastructure tends to be highly heterogeneous, with dense small cells deployed overlay to cellular networks. Along with extremely high capacity and stringent latency requirements, security provisioning is becoming challenging in 5G Heterogeneous Networks (HetNets). Security key management could be difficult in small cells where users join and leave frequently,...
Hackers have multiple avenues for accessing Industrial Control System (ICS) and can adversely impact network hardware, operating systems, and executables. This includes attacking hardware/software switches commonly used in waste water, water treatment, and power substation facilities. Unauthorized network intrusion can be mitigated by augmenting Media Access Control (MAC) based device identity (ID)...
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ubiquitous and transparent mobile IP communications is essential in V2G networks. However, enabling mobile IP communications raises real concerns about...
The Controller Area Network (CAN) is established as the main communication channel inside vehicles. CAN relies on frame broadcast to share data between different microcontrollers managing critical or comfort functions such as cruise control or air conditioning. CAN is distinguished by its simplicity, its real-time application compatibility and its low deployment cost. However, CAN major drawback is...
In this paper we address the impact of the security cost in terms of energy consumption, processing time, and traffic load on quality of services (QoS) in Wireless Sensor Networks (WSNs). Offering security services (authentication, confidentiality, and integrity) and QoS (throughput, delay, and reliability) guarantee in WSNs is still challenging issue. The security and QoS are opposite parameters,...
Current Internet security is complex, expensive and ineffective. The usual argument is that the TCP/IP protocol suite was not designed having security in mind and security mechanisms have been added as add-ons or separate protocols. We argue that fundamental limitations in the Internet architecture are a major factor contributing to the insecurity of the Net. In this paper we explore the security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.